Mimic security scheduling algorithm for industrial control under limited heterogeneous resource constraints
Cyberspace mimic defense technology is an effective method to deal with backdoor attacks on unknown vulnerabilities in information systems.Its security is closely related to the number and the heterogeneity of the executors and the scheduling strategy.However, in the field of industrial control, the...
Saved in:
Main Authors: | Ruyun ZHANG, Heyuan LI, Shunbin LI |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2021-03-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2021047/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Key technologies and implementation methods of endogenous safety and security cloud data center based on mimic architecture
by: Fan ZHANG, et al.
Published: (2021-03-01) -
Endogenous security architecture of Ethernet switch based on mimic defense
by: Ke SONE, et al.
Published: (2020-05-01) -
Heterogeneous redundancies scheduling algorithm for mimic security defense
by: Qinrang LIU, et al.
Published: (2018-07-01) -
Research progress of mimic multi-execution scheduling algorithm
by: Zhengbin ZHU, et al.
Published: (2021-05-01) -
Meaning and Vision of Mimic Computing and Mimic Security Defense
by: Jiangxing Wu
Published: (2014-07-01)